This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. We explore websites that are designed to fool the end users into believing they are on a secure platform.
The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement. Army War College.
For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Team Cymru specializes in using data-driven intelligence to assist in understanding the real impact of cyber-crime.
The world of manufacturing is quickly evolving, driven by production modernization, materials innovation, big data, and a new type of workforce. Improving sourcing cycle time is critical, as is having the right information in place to navigate around roadblocks and mitigate risk. It’s time to add some data experts to your teams.
And what of the data that is the “fuel” powering AI? How is that data validated and being used to avoid bias? Supply chain riskmanagement and domestic sourcing. How is AI being leveraged to streamline procurement processes and evaluations? How is industry using AI to compete and win government business?
Robert Roser Chief Information Security Officer Robert “Rob” Roser is a particle physicist and currently serves as Idaho National Laboratory’s (INL) Chief Information Security Officer as well as Director for Cybersecurity and Chief Data Officer. He joined INL four years go.
And what of the data that is the “fuel” powering AI? How is that data validated and being used to avoid bias? Supply chain riskmanagement and domestic sourcing. How is AI being leveraged to streamline procurement processes and evaluations? How is industry using AI to compete and win government business?
What agencies are looking for is help addressing their boots-on-the-ground challenges, such as the lack of specialized talent, where they should invest their limited R&D funds, meeting the lofty standards of the AI bill of rights – or even how their own data assets are gathered, organized, and used in AI applications.
Additionally, Mark helps clients understand where to start with zero trust and how to utilize security program management and security riskmanagement to ensure continued success in the implementation of Zero Trust concepts.
Auditors said without solid data, it’s hard to determine whether those award fees do much good. ( Whitepapers are due by March 7, and winners will be announced on August 23. This month, CISA extended the charter through 2026 for the Information and Communications Technology Supply Chain RiskManagement Task Force.
Swimming against the tide, and seeking to diverge from the EU’s regulatory agenda and the EU AI Act , the UK announced a light-touch ‘pro-innovation approach’ in its July 2022 AI regulation policy paper. What is the place and role of the Office for AI and the Centre for Data Ethics and Innovation in all this?
Developing a good data inventory: Full of IoT devices? Learn what to include for your expanded attack surface Human Interaction: Learn the critical role humans play amid the new promises of AI Contingency Plans: If your agency was attacked today with ransomware, would you be able to identify your critical data?
Thursday, March 20, 2025 | 2:00PM EDT | 1 Hour | 1 CPE Within our energy agencies, the integration of AI, data, and cybersecurity is essential for advancing the technology modernization required for a stronger future. Participants will gain insights into effective approaches to riskmanagement and modernization methodologies.
Close Publisher, FedInsider Joe Dabrowski × Joe Dabrowski Regional Vice President, SLED Joe leads America’s State, Local and Education Sales organization at Rubrik, working with SLED customers around the country on leveraging the Rubrik Data Security platform to drive cyber resiliency. Murphy, Ph.D. × × John B.
riskmanagement governance] Develop, implement and disclose AI governance and riskmanagement policies, grounded in a risk-based approach – including privacy policies, and mitigation measures, in particular for organizations developing advanced AI systems. In my view, this should be starting point.
Wednesday, November 1, 2023 | 1:00PM EDT | 2 Hours | Training Certificate Ever since the dawn of the internet, its value lies in the data it handles, whether moving it, storing it, or calculating with it. and state agencies’ data because they need the money. Even hostile nation-states such as North Korea seek U.S.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content